Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Author | : | |
Rating | : | 4.87 (697 Votes) |
Asin | : | 1597490059 |
Format Type | : | paperback |
Number of Pages | : | 700 Pages |
Publish Date | : | 2013-02-28 |
Language | : | English |
DESCRIPTION:
Good book I personally like this book. It is not for the light of heart, and for those of you that have no idea what the term reverse engineering means. If you have a knowledge of reverse engineering, or have some experience in analyzing binaries. This is an excellent tool.. "unique reference" according to Jeff Pike. I've had this book for about 6 months now. I've read it, and I've worked through about a third of the code samples.This book starts of with an intro on programming languages that touches on issues relevant to C, C++, Perl, Java, C#, and others that vulnerability researchers might be interested in. The 2nd chapter on NASL (Nessus) scripting is a little sparse, but is suitable for a quick reference.The next three chapters are devoted to BSD, Windows, and Java sockets respecti. Good for what it is I'd say that most people getting a book like this will already be involved with programming a bit. Enough to know what a socket is, how to write a program that uses sockets, etc However, I could be wrong.I guess what I thought was that this book was going to kind of tie everything in together such as "ok, now that you know how to write sockets, we're going to write an exploit that opens a backdoor for you!" However, either I glanced over sections too much, or it just doesn'
Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include
Preceding CSC, Foster was the Director of Research and Development for Foundstone Inc. and an adjunct author at Information Security Magazine, subsequent to working as Security Research Specialist for the Department of Defense. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc. and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include Snort 2.1 Intrusion Detection (Syngress, ISBN: 1-931836-04-3), Hacking Expos
4. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that wi